Skip to main content

A secure command-line password vault.

Project description

psamvault

A secure command-line password vault for the terminal.

Your credentials are encrypted locally before being sent to the server — the server never sees your plaintext passwords or your encryption key.


How it works

login password
      │
      ▼
HMAC-SHA256 + pepper  →  master password
                                │
                                ▼
              PBKDF2 (600k rounds) + kdf_salt  →  login key
                                                        │
                                                        ▼
                                              decrypt VEK (AES-256-GCM)
                                                        │
                                                        ▼
                                              VEK encrypts every vault entry
  • Pepper — unique per device, stored in ~/.psamvault/config.env. Never sent to the server.
  • VEK (Vault Encryption Key) — a random 32-byte key generated at signup. Stored encrypted on the server; decrypted locally at login.
  • kdf_salt — stored on the server, tied to your account. Ensures two users with the same password get different keys.

Installation

pip install psamvault

Or install from source:

git clone https://github.com/psam-717/psamvault-cli
cd psamvault-cli/cli
pip install -e .

Workflow

1. Configure

Run this once after installing. It generates your pepper and saves the API URL.

psamvault configure
 psamvault setup

 Press Enter to accept the default value shown in brackets.

 API URL [https://psam-vault-backend.onrender.com]:
 Generating a secure pepper for your vault...
 Configuration saved to ~/.psamvault/config.env

⚠️ Back up ~/.psamvault/config.env — it contains your pepper. Losing it means losing access to your vault.

To review your current config:

psamvault config-show

2. Sign up

psamvault signup

Creates your account. Your VEK is generated locally, encrypted with your login key, and only the encrypted copy is sent to the server.

Password requirements:

  • At least 8 characters
  • At least one uppercase letter
  • At least one digit

3. Log in

psamvault login

Decrypts your VEK locally using your login password and saves it to a local session file (~/.psamvault/session.json). All vault commands use this session — you won't be prompted for your password again until the session expires.


4. Check who's logged in

psamvault whoami

Vault commands

Add a credential

psamvault add github.com --user me@example.com --pass mysecret
psamvault add github.com --user me@example.com --pass mysecret --notes "2FA enabled"
psamvault add github.com --user me@example.com   # prompts for password

Retrieve a credential

psamvault get github.com
psamvault get github.com --copy   # copies password to clipboard, clears after 30s

List all entries

psamvault list

Shows site name, username hint, and last-updated date. Does not decrypt entries.

Update a credential

psamvault update github.com --pass mynewpassword
psamvault update github.com --user newuser@example.com --pass newpass
psamvault update github.com --notes "2FA disabled"

Delete a credential

psamvault delete github.com

Permanent — prompts for confirmation first.

Generate a secure password

psamvault generate                          # 20-char password with symbols
psamvault generate --length 32
psamvault generate --length 16 --no-symbols
psamvault generate --length 20 --no-digits
psamvault generate --save github.com --user me@example.com  # generate and save

Uses Python's secrets module (cryptographically secure).


Recovery commands

Generate recovery codes

Run this while logged in to protect your account against a forgotten password.

psamvault generate-codes

Generates 8 one-time recovery codes. Each code encrypts your VEK — store them somewhere safe. Running this replaces all existing codes.

Check remaining codes

psamvault remaining-codes

Recover your account (forgotten password)

psamvault recover

Use one of your saved recovery codes to reset your login password without losing your vault data. The VEK is recovered and re-wrapped with your new login key — no vault re-encryption needed.


Log out

psamvault logout

Revokes the refresh token on the server and deletes the local session file. Your encrypted vault data remains safely on the server.


Command groups

All commands are available at the root level and also under grouped sub-commands:

Root shorthand Grouped form
psamvault login psamvault auth login
psamvault add psamvault vault add
psamvault generate-codes psamvault recovery generate-codes

Run any group without a subcommand to see its full command table:

psamvault auth
psamvault vault
psamvault recovery

Configuration files

File Purpose
~/.psamvault/config.env API URL and pepper — back this up
~/.psamvault/session.json Active session tokens and decrypted VEK

Both files are restricted to owner read/write only (chmod 600).


Security notes

  • Your login password is never stored or transmitted in plaintext
  • Your VEK is stored locally only during an active session
  • The server stores only encrypted blobs — it cannot decrypt your vault
  • AES-256-GCM is used for all encryption (authenticated — detects tampering)
  • PBKDF2-HMAC-SHA256 with 600,000 iterations for key derivation (NIST recommended minimum)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

psamvault-0.1.2.tar.gz (19.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

psamvault-0.1.2-py3-none-any.whl (27.7 kB view details)

Uploaded Python 3

File details

Details for the file psamvault-0.1.2.tar.gz.

File metadata

  • Download URL: psamvault-0.1.2.tar.gz
  • Upload date:
  • Size: 19.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for psamvault-0.1.2.tar.gz
Algorithm Hash digest
SHA256 3978bddeca50eb9bc05e07657b9283cf0d522df27e20c57128e580cbaaa0285b
MD5 ac43d91c7ef0cc72fe9d2d77eaf89e6e
BLAKE2b-256 b4a9100add8805786e9501a30f2ef5e5cb102ab3e9e006a96864cade50577942

See more details on using hashes here.

File details

Details for the file psamvault-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: psamvault-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 27.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for psamvault-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 0ede64632be698ef37cec8235cc72beff01f04722da77739c281beb8085bcdac
MD5 a9c1ab7f136981a6b68167d3934f7693
BLAKE2b-256 e0da5ef7e8d5e565c078cc845aa0dd95ee3b8fff257aa068acb0a09ce0b8fd45

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page